EP2224700B1 - System and method for providing identifying information to a mobile device - Google Patents
System and method for providing identifying information to a mobile device Download PDFInfo
- Publication number
- EP2224700B1 EP2224700B1 EP09154042.7A EP09154042A EP2224700B1 EP 2224700 B1 EP2224700 B1 EP 2224700B1 EP 09154042 A EP09154042 A EP 09154042A EP 2224700 B1 EP2224700 B1 EP 2224700B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- mobile device
- enterprise
- source
- identifying information
- incoming communication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims description 41
- 238000004891 communication Methods 0.000 claims description 122
- 230000000977 initiatory effect Effects 0.000 claims description 8
- 230000001413 cellular effect Effects 0.000 description 17
- 230000011664 signaling Effects 0.000 description 17
- 238000012545 processing Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 230000004044 response Effects 0.000 description 9
- 238000013515 script Methods 0.000 description 5
- 238000012546 transfer Methods 0.000 description 5
- 238000010295 mobile communication Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 235000006508 Nelumbo nucifera Nutrition 0.000 description 1
- 240000002853 Nelumbo nucifera Species 0.000 description 1
- 235000006510 Nelumbo pentapetala Nutrition 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008929 regeneration Effects 0.000 description 1
- 238000011069 regeneration method Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42314—Systems providing special services or facilities to subscribers in private branch exchanges
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/57—Arrangements for indicating or recording the number of the calling subscriber at the called subscriber's set
- H04M1/575—Means for retrieving and displaying personal data about calling party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/26—Devices for calling a subscriber
- H04M1/27—Devices whereby a plurality of signals may be stored simultaneously
- H04M1/274—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
- H04M1/2745—Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
- H04M1/27453—Directories allowing storage of additional subscriber data, e.g. metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2207/00—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
- H04M2207/18—Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42034—Calling party identification service
- H04M3/42042—Notifying the called party of information on the calling party
- H04M3/42051—Notifying the called party of information on the calling party where the notification is included in the ringing tone
Definitions
- the present application relates to generally to mobile communication devices and, more particularly, to systems and methods for providing identifying information about incoming communications to mobile devices.
- Mobile communication devices such as cellular telephones, PDAs and BlackBerry® devices are often capable of displaying identifying information about the source of an incoming communication. This provides information to the user of the mobile device which may aid the user in deciding whether to accept the communication at that time.
- PSTN public switched telephone network
- PLMN public land mobile network
- this information may be provided, for example, using a caller ID function provided by the common communication carrier.
- Other communications may be routed to or through a system, such as an enterprise network including a corporate private branch exchange (PBX), which is operated or controlled independently of the network on which the communication originated. In such instances special difficulties may arise in providing the targeted mobile device with identifying information concerning the source of the communication.
- PBX corporate private branch exchange
- WO2005/039159 describes an information server including a processing system which is configured to receive one or more digital content sets, receive a caller system identifier and a called system identifier from the caller system, select a digital content set from-among the one or more digital content sets-using the caller system identifier and the called system identifier, and provide the selected digital content set to a called system corresponding to the called system identifier prior to the caller system establishing a communication channel to the called system.
- DE3742359 describes a telecommunication system using DTMF signaling.
- a system for transmitting identifying information about a source of an incoming communication to a mobile device has a communications platform for receiving the incoming communication and initiating a connection between the source of the incoming communication and the mobile device and a DTMF module coupled to the communications platform for generating and transmitting a DTMF message to the mobile device upon receipt of an incoming communication by the communications platform. If the source of the incoming communication has an enterprise-assigned number, the DTMF message comprises an identifying key corresponding to the key field of a profile list comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list, and otherwise, the DTMF message comprises an identifying number for the source of the incoming communication.
- a method of transmitting identifying information about a source of an incoming communication to a mobile device connected to an enterprise network comprises, receiving the incoming communication at the enterprise network; initiating a connection between the source of the incoming communication and the mobile device; and generating and transmitting a DTMF message to the mobile device. If the source of the incoming communication has a enterprise-assigned number, the DTMF message comprises an identifying key corresponding to the key field of a profile list comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list, and otherwise, the DTMF message comprises an identifying number for the source of the incoming communication.
- a method of displaying identifying information about a source communication device to a user of a mobile device connected to an enterprise network comprises: receiving a notification of an incoming communication from the enterprise network, the notification comprising a DTMF message; using the DTMF message to determine the identifying information of the source communication device; and displaying the identifying information on the mobile device.
- Figure 1 shows, in block diagram form, an example system for managing enterprise-related mobile calls, including an enterprise communications platform;
- FIG. 2 shows, in block diagram form, further details of an embodiment of the enterprise communications platform
- Figure 3 shows another embodiment of the enterprise communications platform
- Figure 4 shows yet another embodiment of the enterprise communications platform
- Figures 5A and 5B show, in block diagram form, further details of the enterprise communications platform of Figure 3 ;
- Figure 6A is a signaling diagram generally indicating how mobile-originated, mobile-initiated calls are processed by the network of Figure 5 ;
- Figure 6B is a signaling diagram generally indicating how mobile-originated, PBX-initiated, calls are processed by the network of Figure 5 ;
- Figure 7A is a signaling diagram generally indicating how mobile-terminated, mobile-initiated calls are processed by the network of Figure 5 ;
- Figure 7B is a signaling diagram generally indicating how mobile-terminated, PBX-initiated calls are processed by the network of Figure 5 ;
- Figure 8 shows a method of providing identifying information about a source communication to a mobile device according to an embodiment.
- Embodiments of the present application are not limited to any particular operating system, mobile device architecture, server architecture, or computer programming language.
- the present application relates to the control and management of communications.
- calls in the description of example embodiments below, it will be appreciated that the described systems and methods are applicable to session-based communications in general and not limited to voice calls. It will also be appreciated that the systems and methods may not be limited to sessions and may be applicable to messaging-based communications in some embodiments.
- FIG. 1 shows, in block diagram form, an example system, generally designated 10, for the control and management of communications.
- the system 10 includes an enterprise or business system 20, which in many embodiments includes a local area network (LAN).
- LAN local area network
- the enterprise or business system 20 may be referred to as an enterprise network 20. It will be appreciated that the enterprise network 20 may include more than one network and may be located in multiple geographic areas in some embodiments.
- the enterprise network 20 may be connected, often through a firewall 22, to a wide area network (WAN) 30, such as the Internet.
- WAN wide area network
- the enterprise network 20 may also be connected to a public switched telephone network (PSTN) 40 via direct inward dialing (DID) trunks or primary rate interface (PRI) trunks.
- DID direct inward dialing
- PRI primary rate interface
- the enterprise network 20 may also communicate with a public land mobile network (PLMN) 50, which may also be referred to as a wireless wide area network (WWAN) or, in some cases, a cellular network.
- PLMN public land mobile network
- WWAN wireless wide area network
- the connection with the PLMN 50 may be made via a relay 26, as known in the art.
- the enterprise network 20 may also provide a wireless local area network (WLAN) 32a featuring wireless access points.
- WLAN wireless local area network
- Other WLANs 32 may exist outside the enterprise network 20.
- WLAN 32b may be connected to WAN 30.
- the system 10 may include a number of enterprise-associated mobile devices 11 (only one shown).
- the mobile devices 11 may include devices equipped for cellular communication through the PLMN 50, mobile devices equipped for Wi-Fi communications over one of the WLANs 32, or dual-mode devices capable of both cellular and WLAN communications.
- WLANs 32 may be configured in accordance with one of the IEEE 802.11 specifications.
- mobile devices 11 are two-way mobile communication devices having at least voice and data communication capabilities, including the capability to communicate with other digital or analog automatic data processing systems (i.e., computers).
- mobile devices 11 suitable for use in implementing systems and methods disclosed herein include, depending on the functionality provided, data messaging devices, two-way pagers, cellular telephones with data messaging capabilities, wireless Internet appliances, data communication devices (with or without telephony capabilities), a clamshell device, personal digital devices (PDAs) and flip-phones.
- the mobile devices 11 include one or more radio transceivers and associated processing hardware and software to enable wireless communications with the PLMN 50 and/or WLAN(s) 32.
- the PLMN 50 and mobile devices 11 may be configured to operate in compliance with any one or more of a number of wireless protocols, including GSM, GPRS, CDMA, EDGE, UMTS, EvDO, HSPA, 3GPP, or a variety of others. It will be appreciated that the mobile device 11 may roam within the PLMN 50 and across PLMNs, in known manner, as the user moves.
- the dual-mode mobile devices 11 and/or the enterprise network 20 are configured to facilitate roaming between the PLMN 50 and a WLAN 32, and are thus capable of seamlessly transferring sessions (such as voice calls) from a connection with the cellular interface of the dual-mode device 11 to the WLAN 32 interface of the dual-mode device 11, and vice versa.
- the enterprise network 20 typically includes a number of networked servers, computers, and other devices.
- the enterprise network 20 may connect one or more desktop or laptop computers 15 (one shown).
- the connection may be wired or wireless in some embodiments.
- the enterprise network 20 may also connect to one or more digital telephone sets 17 (one shown).
- the enterprise network 20 may include one or more mail servers, such as mail server 24, for coordinating the transmission, storage, and receipt of electronic messages for client devices operating within the enterprise network 20.
- mail servers suitable for use in implementing systems and methods disclosed herein include the Microsoft Exchange ServerTM and the IBM Lotus DominoTM server.
- Each user within the enterprise typically has at least one user account within the enterprise network 20.
- message address information such as an e-mail address.
- Messages addressed to a user message address are stored on the enterprise network 20 in the mail server 24.
- the messages may be retrieved by the user using a messaging application, such as an e-mail client application.
- the messaging application may be operating on a user's computer 15 connected to the enterprise network 20 within the enterprise.
- the user may be permitted to access stored messages using a remote computer, for example at another location via the WAN 30 using a VPN connection.
- the user may also compose and send messages addressed to others, within or outside the enterprise network 20.
- the messaging application causes the mail server 24 to send a composed message to the addressee, often via the WAN 30.
- the relay 26 serves to route messages received over the PLMN 50 from the mobile device 11 to the corresponding enterprise network 20.
- the relay 26 also pushes messages from the enterprise network 20 to the mobile device 11 via the PLMN 50.
- the enterprise network 20 also includes an enterprise server 12. Together with the relay 26, the enterprise server 12 functions to redirect or relay incoming e-mail messages addressed to a user's e-mail address within the enterprise network 20 to the user's mobile device 11 and to relay incoming e-mail messages composed and sent via the mobile device 11 out to the intended recipients within the WAN 30 or elsewhere.
- the enterprise server 12 and relay 26 together facilitate "push" e-mail service for the mobile device 11 enabling the user to send and receive e-mail messages using the mobile device 11 as though the user were connected to an e-mail client within the enterprise network 20 using the user's enterprise-related e-mail address, for example on computer 15.
- the enterprise network 20 includes a Private Branch eXchange (although in various embodiments the PBX may be a standard PBX or an IP-PBX, for simplicity the description below uses the term PBX to refer to both) 16 having a connection with the PSTN 40 for routing incoming and outgoing voice calls for the enterprise.
- the PBX 16 is connected to the PSTN 40 via DID trunks or PRI trunks, for example.
- the PBX 16 may use ISDN signaling protocols for setting up and tearing down circuit-switched connections through the PSTN 40 and related signaling and communications.
- the PBX 16 may be connected to one or more conventional analog telephones 19.
- the PBX 16 is also connected to the enterprise network 20 and, through it, to telephone terminal devices, such as digital telephone sets 17, soft-phones operating on computers 15, etc.
- each individual may have an associated extension number, sometimes referred to as a PNP (private numbering plan), or direct dial phone number.
- Calls outgoing from the PBX 16 to the PSTN 40 or incoming from the PSTN 40 to the PBX 16 are typically circuit-switched calls.
- voice calls are often packet-switched calls, for example Voice-over-IP (VoIP) calls.
- VoIP Voice-over-IP
- the enterprise network 20 may further include a Service Management Platform (SMP) 18 for performing some aspects of messaging or session control, like call control and advanced call processing features.
- SMP 18 may, in some cases, also perform some media handling.
- Collectively the SMP 18 and PBX 16 may be referred to as the enterprise communications platform, generally designated 14. It will be appreciated that the enterprise communications platform 14 and, in particular, the SMP 18, is implemented on one or more servers having suitable communications interfaces for connecting to and communicating with the PBX 16 and/or DID/PRI trunks.
- the SMP 18 may be implemented on a stand-alone server, it will be appreciated that it may be implemented into an existing control agent/server as a logical software component. As will be described below, the SMP 18 may be implemented as a multi-layer platform.
- the enterprise communications platform 14 implements the switching to connect session legs and may provide the conversion between, for example, a circuit-switched call and a VoIP call, or to connect legs of other media sessions.
- the enterprise communications platform 14 provides a number of additional functions including automated attendant, interactive voice response, call forwarding, voice mail, etc. It may also implement certain usage restrictions on enterprise users, such as blocking international calls or 1-900 calls.
- Session Initiation Protocol SIP may be used to set-up, manage, and terminate media sessions for voice calls.
- Protocols may also be employed by the enterprise communications platform 14, for example, Web Services, Computer Telephony Integration (CTI) protocol, Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE), and various custom Application Programing Interfaces (APIs), as will be described in greater detail below.
- CTI Computer Telephony Integration
- SIMPLE Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions
- APIs Application Programing Interfaces
- One of the functions of the enterprise communications platform 14 is to extend the features of enterprise telephony to the mobile devices 11.
- the enterprise communications platform 14 may allow the mobile device 11 to perform functions akin to those normally available on a standard office telephone, such as the digital telephone set 17 or analog telephone set 15.
- Example features may include direct extension dialing, enterprise voice mail, conferencing, call transfer, call park, etc.
- FIGS. 2 to 4 show example embodiments of the enterprise communications system 14. Again, although references are made below to "calls" or call-centric features it will be appreciated that the architectures and systems depicted and described are applicable to session-based communications in general and, in some instances, to messaging-based communications.
- FIG. 2 illustrates an embodiment intended for use in a circuit-switched TDM context.
- the PBX 16 is coupled to the SMP 18 via PRI connection 60 or other suitable digital trunk.
- the PRI connection 60 may include a first PRI connection, a second PRI connection, and a channel service unit (CSU), wherein the CSU is a mechanism for connecting computing devices to digital mediums in a manner that allows for the retiming and regeneration of incoming signals.
- CSU channel service unit
- the SMP 18 assumes control over both call processing and the media itself.
- This architecture may be referred to as "First Party Call Control”.
- Many of the media handling functions normally implemented by the PBX 16 are handled by the SMP 18 in this architecture.
- Incoming calls addressed to any extension or direct dial number within the enterprise, for example, are always first routed to the SMP 18. Thereafter, a call leg is established from the SMP 18 to the called party within the enterprise, and the two legs are bridged.
- the SMP 18 includes a digital trunk interface 62 and a digital signal processing (DSP) conferencing bridge 64.
- the DSP conferencing bridge 64 performs the bridging of calls for implementation of various call features, such as conferencing, call transfer, etc.
- the digital trunk interface 62 may be implemented as a plurality of telephonic cards, e.g. Intel Dialogic cards, interconnected by a bus and operating under the control of a processor.
- the digital trunk interface 62 may also be partly implemented using a processor module such as, for example, a Host Media Processing (HMP) processor.
- HMP Host Media Processing
- the SMP 18 may include various scripts 66 for managing call processing.
- the scripts 66 are implemented as software modules, routines, functions, etc., stored in non-volatile memory and executed by the processor of the SMP 18.
- the scripts 66 may implement call flow logic, business logic, user preferences, call service processes, and various feature applications.
- FIG 3 shows an embodiment of an enterprise communications system 14 in which the PBX 16 performs the functions of terminating and/or bridging media streams, but call control functions are largely handled by the SMP 18.
- the SMP 18 may be referred to as a call control server 18.
- This architecture may be referred to as "Third-Party Call Control”.
- the call control server 18 is coupled to the PBX 16, for example through the LAN, enabling packet-based communications and, more specifically, IP-based communications. In one embodiment, communications between the PBX 16 and the call control server 18 are carried out in accordance with SIP. In other words, the call control server 18 uses SIP-based communications to manage the set up, tear down, and control of media handled by the PBX 16. In one example embodiment, the call control server 18 may employ a communications protocol conforming to the ECMA-269 or ECMA-323 standards for Computer Supported Telecommunications Applications (CSTA).
- CSTA Computer Supported Telecommunications Applications
- FIG 4 shows yet another embodiment of the enterprise communications system 14.
- This embodiment reflects the adaptation of an existing set of call processing scripts to an architecture that relies on third-party call control, with separate call control and media handling.
- the SMP 18 includes a call processing server 74.
- the call processing server 74 includes the scripts or other programming constructs for performing call handling functions.
- the SMP 18 also includes a SIP server 72 and a media server 76.
- the separate SIP server 72 and media server 76 logically separate the call control from media handling.
- the SIP server 72 interacts with the call processing server 74 using a computer-implemented communications handling protocol, such as one of the ECMA-269 or ECMA-323 standards. These standards prescribe XML based messaging for implementing Computer Supported Telecommunications Applications (CSTA).
- CSTA Computer Supported Telecommunications Applications
- the SIP server 72 interacts with the media server 76 using SIP-based media handling commands.
- the SIP server 72 and media server 76 may communicate using Media Server Markup Language (MSML) as defined in IETF document Saleem A., "Media Server Markup Language", Internet Draft, draft-saleem-msml-07, August 7, 2008 .
- the media server 76 may be configured to perform Host Media Processing (HMP).
- HMP Host Media Processing
- the SMP 18 is a multi-layer platform that includes a protocol layer 34, a services layer 36 and an application layer 38.
- the protocol layer 34 includes a plurality of interface protocols configured for enabling operation of corresponding applications in the application layer 38.
- the services layer 36 includes a plurality of services that can be leveraged by the interface protocols to create richer applications.
- the application layer 38 includes a plurality of applications that are exposed out to the communication devices and that leverage corresponding ones of the services and interface protocols for enabling the applications.
- the protocol layer 34 preferably includes protocols which allow media to be controlled separate from data.
- the protocol layer 34 can include, among other things, a Session Initiation Protocol or SIP 80, a Web Services protocol 82, an Application Programming Interface or API 84, a Computer Telephony Integration protocol or CTI 86, and a Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions or SIMPLE protocol 88.
- the interface protocols 80-88 are plug-ins that can interface directly with corresponding servers in the enterprise network 20, which will be further described below.
- SIP 80 will be utilized, although it is appreciated that the system 10 can operate using the above disclosed or additional protocols.
- SIP is the IETF (Internet Engineering Task Force) standard for multimedia session management, and more specifically is an application-layer control protocol for establishing, maintaining, modifying and terminating multimedia sessions between two or more endpoints.
- the SIP protocol 80 includes two interfaces for signaling: SIP-Trunk (hereinafter referred to as "SIP-T”) and SIP-Line (hereinafter referred to as "SIP-L").
- the SIP-T interface is utilized when the endpoint is a non-specific entity or not registered (i.e., when communicating between two network entities).
- the SIP-L interface is utilized when the endpoint is registered (i.e., when dialing to a specific extension). The specific operation of the system 10 utilizing SIP 80 will be described in further detail below.
- SMP 18 also includes a plurality of enablers, among other things, a VoIP enabler 90, a Fixed Mobile Convergence or FMC enabler 92, a conference services enabler 94, a presence enabler 96 and an Instant Messaging or IM enabler 98.
- Each of the enablers 90-98 are used by corresponding services in the services layer 36 that combine one or more of the enablers.
- Each of the applications in the application layer 38 is then combined with one or more of the services to perform the desired application.
- a phone call service may use the VoIP or PBX enabler
- an emergency response application may use the phone call service, an Instant Messenger service, a video call service, and email service and/or a conference service.
- the application layer 38 may include a conference services application 63 that, together with the conference services enabler 94, enables multiple communication devices (including desk telephones and personal computers) to participate in a conference call through use of a centralized conference server 55.
- the conference server 55 is provided in the enterprise network 20 and is in communication with the conference services enabler 94 preferably through the SIP protocol 80, although it is recognized that additional protocols that control media separate from data may be appropriate, such as the Web Services protocol 82 or the CTI protocol 86.
- the conference call server 55 is configured for directing media and data streams to and from one or more communication devices (i.e., mobile devices 11, telephones 17, and computers 15).
- Figure 6A provides a signaling diagram for a call originating from one of the mobile devices 11 to a target phone 101 connected to a Private Branch Exchange Server or PBX 16 provided within the enterprise network 20.
- the device 11 sends a mobile originated call request with its cellular number and the destination number of the target phone 101 to the SMP 18 (block 100).
- the mobile originated call request may be sent via the WLAN through the enterprise server 12.
- the call request may be sent via the PLMN/PSTN through the PBX 16, for example as an SMS message or using another messaging operation.
- the SMP 18 confirms the call request by sending the DNIS number to the device 11 (block 102).
- the device 11 makes a cellular call using the DNIS number, which is received by the PBX 16 (block 104).
- the DNIS has been configured in the PBX 16 to be routed to the SMP 18 via SIP-T
- the PBX 16 in response to the incoming call, the PBX 16 sends an invite over SIP-T with the DNIS number to the SMP 18 (block 106).
- the SMP 18 matches the incoming call with the expected call from the mobile, and if correct, acknowledges the invite by sending a 200 OK signal to the PBX 16, indicating that the mobile call leg is established (block 108).
- the SMP 18 sets up the outgoing call leg to the destination. It does this by sending an invite over SIP-L to the PBX 16 with the destination number of the target phone (block 110). SIP-L is used so that the call can be correctly attributed to the individual within the organization within any call records that are being maintained by the PBX 16.
- the PBX 16 dials the destination number to the target phone 101 (block 112), and the target phone 101 answers the call (block 114).
- the PBX 16 sends a 200 OK signal to the SMP 18 indicating that the target phone 101 is ready to receive data (block 115).
- the SMP 18 then sends an invite over SIP-T to the PBX 16 and shuffles the SDP (Session Description Protocol, as known to those of ordinary skill in the art) to connect the call legs (block 116).
- the PBX 16 sends a second 200 OK signal to the SMP 18 (block 118), and the users of the device 11 and target phone 101 can communicate with each other.
- ringing tones may be provided by the PBX 16 using the presentation of early media from the outgoing call leg, or they may be generated locally on the device 11 if early media is not available. In the latter case, it will be necessary to localize the ringing tone to match the tone normally heard with a call through the PBX 16.
- the SMP 18 provides the mobile device 11 with the DNIS number into which the mobile device 11 has called.
- the mobile originated call could be "PBX initiated", as shown in Figure 6B .
- the SMP 18 upon receipt of the mobile originated call request (block 120), the SMP 18 confirms receipt of the call to the mobile device 11 with an ANI number (block 122), which the mobile device uses to identify the incoming call from the PBX 16.
- the PBX 16 then sends an invite over SIP-T to the PBX 16 with the cellular number of the device and the ANI number that is attached to the outgoing call (block 124).
- the PBX 16 Upon receipt of the invite, the PBX 16 makes a cellular call to the device 11 (block 126), which is answered by the device (block 128).
- the device 11 checks the ANI number in the incoming call to confirm if the number is actually from the PBX 16. If the ANI number is stripped for any particular reason, then the device 11 may be configured to answer the call as a regular cellular call, or it may reject the call as unknown.
- the PBX 16 sends a 200 OK signal to the SMP 18, indicating that the call leg to the device is established (block 130).
- the SMP 18 sends an invite over SIP-L with the destination number of the target phone 101 to the PBX 16 (block 132).
- the PBX dials the destination number to the target phone 101 (block 134), the target phone 101 picks up the call (block 136), and a 200 OK signal is sent from the PBX 16 to the SMP 18 (block 138), indicating that the target phone 101 is also ready to receive data.
- the SMP 18 sends an invite to the PBX 16, shuffling the SDP to connect the call legs (block 140).
- the PBX 16 sends a second 200 OK signal to the SMP 18, and the users of the device 11 and target phone 101 are able to communicate with each other.
- the SMP 18 is performing third party call control of the two call legs, the PBX 16 remaining in control of the call.
- the decision of whether to proceed with a mobile-initiated call or a PBX-initiated call can be set by policy.
- the option to select either mobile-initiated or PBX-initiated calls is a feature provided in the SMP 18, and an administrator for the enterprise network 20 can determine which setting to use. For example, in some cases it may be more cost effective for the corporation to utilize PBX-initiated calls rather than mobile-initiated calls, and vice versa.
- the system 10 is not limited to the above processes.
- FIGs 7A and 7B are signaling diagrams illustrating a mobile terminated call utilizing SIP 80.
- the target phone 101 is originating the call, which will send a call to the mobile device.
- an incoming call is made from the target phone 101 to the PBX 16 (block 150).
- the PBX 16 sends an invite to the SMP 18 over SIP-L (block 152).
- the SMP 18 sends a call request with the DNIS number and source details to the device 11 (block 154), which is confirmed to the SMP (block 156). These source details may be sent via a data connection between the system 20 and the mobile device 11, such as that discussed further in relation to Figure 8 .
- the mobile device 11 sends a cellular call to the DNIS number at the PBX 16 (block 158). Again, as the DNIS number is routed in the dialing plans to the SMP 18, upon receipt of the cellular call, the PBX 16 sends an invite over SIP-T to the SMP 18 with the DNIS number (block 160).
- a "200 OK" signal is sent over SIP-T from the SMP 18 to the PBX 16, acknowledging that the call leg to the mobile device 11 is established (block 162).
- the initial invite (block 152) is acknowledged with the "200 OK" signal with the cellular SDP, at which point the call legs are joined and the target phone 101 and device 11 can communicate with each other on the call.
- FIG. 7A illustrates a "mobile-initiated" call, because, as discussed above with respect to Figures 6A and 6B , the SMP 18 presents the mobile device 11 with the DNIS number at the PBX 16 into which to call.
- PBX-initiated mobile terminated call, as shown in Figure 7B , where the PBX 16 sends an incoming call to the device 11 with the ANI number of the target phone 101.
- the target phone 101 sends an incoming call to the destination number of the device, which is received at the PBX 16 (block 170).
- the PBX 16 Upon receipt of the call, the PBX 16 sends an invite over SIP-L to the SMP 18 (block 172) with the source number of the target phone 101.
- the SMP 18 sends a call request with the source number to the device 11 (block 174), with the ANI number the device should expect in the incoming call, the call request being confirmed by the device (block 176).
- the SMP 18 sends an invite over SIP-T to the PBX 16 with the cellular number and ANI number to use (block 178), prompting the PBX 16 to make a cellular call to the device 11 with the ANI number (block 180), prompting the device to ring.
- the device 11 answers the call (block 182), and a "200 OK" signal is sent from the PBX 16 to the SMP 18, acknowledging that the cellular call leg to the device 11 is established (block 184).
- a "200 OK" signal is also sent from the SMP 18 to the PBX 16, acknowledging that the call leg to the target phone 101 is also established (block 186).
- the SMP 18 shuffles the SDP to connect the call legs, the call legs are joined, and the target phone 101 and device 11 can communicate with each other on the call.
- the SMP 18 remains in control of the signaling between the target phone 101 and the mobile device 11 in both the mobile-initiated and PBX-initiated calls.
- the decision to proceed with a mobile-initiated call or a PBX-initiated call is based on policy and may be set by a system administrator. In some cases, it may be more efficient or cost effective for the administrator to decide that PBX-initiated calls should be used, and in other cases, it may be more efficient or cost effective for mobile-initiated calls to be utilized. As these policy decisions may vary by organization and are not imperative to the scope of the present application, they will not be discussed in further detail.
- Figure 8 shows an embodiment of a method 800 of providing to a mobile device 11 identifying information about a source of a communication to the mobile device.
- Method 800 is suitable for implementation by, for example, the enterprise server architecture shown in Figure 1 to which reference will be made where appropriate.
- a communication such as a request to initiate a call intended for a mobile device 11 is received by PBX server 16 or other device associated with enterprise network 20. This corresponds, for example, to block 150 of Figure 7A or block 170 of Figure 7B .
- the PBX server 16 or other device receiving the incoming communication request may be capable of sending and receiving different types or layers of data to and from the mobile device 11, particularly where mobile device 11 is a dual-mode device as described above.
- an auditory layer or voice channel or voice service
- a data layer or data channel or data service
- sending the ANI number to the mobile device as shown in blocks 122 and 174 of Figures 6B and 7B respectively, can be done using the data layer.
- Identifying information about the source of an incoming communication may be transferred to a mobile device 11 from the enterprise network 11 using the data layer.
- source details are sent to the mobile device 11 from the SMP 18 using the data layer.
- Such source details can be sent via the data layer only when and where data service is available.
- the system 16, 20, etc. checks to determine whether data service is available between the mobile device 11 and the enterprise network 20. If data service is available, the identifying information is sent to the mobile device using the data layer at block 806. The identifying information can then be displayed on the mobile device 11 and the communication may proceed as depicted, for example, in Figure 7A .
- data service may not be available between the enterprise network 20 and the mobile device 11. This may occur, for example, when the device is roaming. Alternatively, the mobile device may be an older device or other device with which data service is never available. In such cases, the identifying information about the source of a communication can not be sent using the data layer. In other situations, it may not be desirable to use the data service between the enterprise network 20 and the mobile device 11 even where data service is available, for example, where the sending of identifying information does not easily fit into the data service protocol. Where no data service is available or the use of data service is undesirable, other techniques may be used to transfer identifying information to the mobile device 11 if this information is to be displayed on the device.
- the system determines whether dual-tone multi-frequency (DTMF) capabilities are available for the mobile device 11. If DTMF is available then a DTMF message comprising the identifying information can be generated by the enterprise network 20 and transmitted to the mobile device 11. This may be done, for example, using a DTMF module coupled to the communications platform 14 resident in a memory of the enterprise network 20 to be executed by a processor of the enterprise network 20. Dual-tone multi-frequency (DTMF) signaling is used for telephone signaling in the voice-frequency band. Hence, a DTMF message can be sent to the mobile device 11 regardless of whether or not data service is availible between the enterprise network 20 and the mobile device 11. Methods of generating and receiving DTMF messages are well known in the art.
- the mobile device 11 may then use information extracted from the DTMF message to identify the source of the communication.
- the contents of such a DTMF message may depend on any suitable factors, including for example, whether or not the source of the incoming communication is a device known to the enterprise network 20.
- the content of the DTMF message may depend on whether or not the assigned telephone number or other address information associated with the source of the communication has been assigned or otherwise recognized by the enterprise network or its administrator(s).
- a device associated with an enterprise-assigned number is sometimes referred to as a participant in the enterprise network.
- the DTMF message may contain an identifying key.
- the identifying key may allow the mobile device 11 to look up information about the source of the communication in, for example, a profile list stored on the mobile device 11.
- the profile list may include a list of all participants (or a specific subset of participants) for the enterprise network 20 and may be passed to each participant device using the data layer when data service is available or through some other means. Updates to the profile list may be sent to the mobile device 11 from the enterprise network 20 periodically on a set schedule or whenever changes occur to the list.
- the profile list may, for example, be in the form of a spreadsheet and may comprise identifying information entries for each participant in the list including, for example, each participant's name and phone number as well as possibly other information such as a participant's location, department and internal extension.
- Each entry in the profile list may contain a key field.
- the length of the profile list may be limited by the length of the key field. In general, the length of the key field may be limited to a size which is practical to be sent using the methods discussed herein.
- the identifying key contained in the DTMF message may be used by the mobile device 11 to find the appropriate entry in the profile list with a matching key field. Some or all of the information from the appropriate entry in the profile list may then be displayed on the mobile device 11.
- identifying information for a participant can be stored in an address book or other suitably-configured data store associated with or otherwise accessible by the mobile device 11 with an optionally hidden DTMF key field and Boolean value indicating that the entry is a participant.
- the mobile device can in such circumstances match the identifying key from the DTMF message to the entry in the address book with a matching DTMF key and extract the identifying information to be displayed.
- the identifying key could itself be part of the identifying information, such as the user's telephone number, or it could be another number, such as a sequential or random number, assigned specifically for this purpose.
- the identifying key may be updated periodically for security purposes.
- the DTMF message may contain or otherwise represent an identifying number (such as the telephone number) or other address information, or other information identifying the source of the communication. Such information can be extracted from the DTMF message and displayed on the mobile device 11.
- the mobile device 11 can also display a message indicating, for example, that the source of the communication is an outside caller.
- the DTMF message may also include a security key used by the mobile device 11 to confirm that the DTMF message originates from the enterprise network 20.
- the enterprise network 20 can maintain a database or other machine-readable store of security numbers (or other information) which it may permit mobile device 11 to access though the data layer when data service is available or through some other means. Such a store of numbers or other identifiers may be changed or updated periodically, or otherwise as appropriate or desired.
- the message may include such a security identifier.
- the mobile device 11 can extract the security identifier and check it against the security identifiers accessible by it via enterprise network 20.
- the mobile device 11 may assume there has been a breach in security and terminate the communication. It should be noted that this is only one possible implementation of the use of security identifiers or other keys, and those of skill in the art will recognize that there may be a number of different ways in which such a security key could be implemented.
- the system can determine whether a caller identification code, such as the automatic number identification (ANI), of the communication can be manipulated.
- ANI is a feature of telephony intelligent network services that permits subscribers to display or capture the telephone numbers of calling parties.
- An ANI may be sent to the mobile device 11 from the enterprise network 20 when the call is initiated, for example at block 174 of Figure 7B .
- the ANI may be manipulated in order to send information about the source of the communication to the mobile device 11 such as the number (e.g. telephone number) of the source of the communication.
- the manipulation of the ANI to include the number of a source communication is sometimes called ANI mangling. If ANI mangling is possible, the ANI will be manipulated at block 818.
- ANI manipulation is available then, at block 818, logic similar to that employed in blocks 810 to 814 may be utilized.
- an identifying key to the profile list described above may be sent to the mobile device, as in block 812 of method 800.
- the ANI may be the following: 992-001-1111. The first three digits, 992, could be used to identify the communication as Enterprise participant communication. The second three digits, 001, could be a security key or type of call identifier. The final four digits, 1111, could represent the identifying key to the same profile list used in DTMF logic described above.
- the ANI may contain or otherwise represent an identifying number (such as the telephone number) or other address information, or other information identifying the source of the communication, as in block 814.
- the ANI could be 993-123-456-7890 where 993 identifies call as an Enterprise communication from non participant with caller id 1234567890.
- the transmission of a telephone number may be considered less secure than sending an idenifying key, as in block 812, because the acutal number of source of the incoming communication is included in the message.
- the manipulation of an ANI is not permitted where the resulting number is not a number owned by the system performing the manipulation.
- a enterprise network 20 would not be permitted to manipulate the ANI to include the number of an outside (non-participant) caller.
- the enterprise network 20 may set aside a number or other identifier which it does own to be used to indicate that an incoming communication is from an outside caller.
- the ANI can be manipulated at block 820 to include this dedicated number.
- the mobile device 11 received a call indicating that the source of the communication is the dedicated number, it would recognize the number as an indication that the caller is an outside (non-participant) caller and can display a message to that effect.
- ANI mangling will normally be available for participant sources even in such jurisdictions because a participant source will, by definition, have a number assigned by the enterprise network 20. Hence, the number of a participant source will normally be owned by the enterprise network 20.
- the present disclosure is primarily described as a method, a person of ordinary skill in the art will understand that the present disclosure is also directed to an apparatus for carrying out the disclosed method and including apparatus parts for performing each described method block, be it by way of hardware components, a computer programmed by appropriate software to enable the practice of the disclosed method, by any combination of the two, or in any other manner.
- an article of manufacture for use with the apparatus such as a prerecorded storage device or other similar computer readable medium including program instructions recorded thereon, or a computer data signal carrying computer readable program instructions may direct an apparatus to facilitate the practice of the disclosed method. It is understood that such apparatus, articles of manufacture, and computer data signals also come within the scope of the present disclosure.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Description
- The present application relates to generally to mobile communication devices and, more particularly, to systems and methods for providing identifying information about incoming communications to mobile devices.
- Mobile communication devices, such as cellular telephones, PDAs and BlackBerry® devices are often capable of displaying identifying information about the source of an incoming communication. This provides information to the user of the mobile device which may aid the user in deciding whether to accept the communication at that time. Where the communication is received by the mobile device from the source of the communication over a single communications network, as for example over the public switched telephone network (PSTN) or over a public land mobile network (PLMN), this information may be provided, for example, using a caller ID function provided by the common communication carrier. Other communications, however, may be routed to or through a system, such as an enterprise network including a corporate private branch exchange (PBX), which is operated or controlled independently of the network on which the communication originated. In such instances special difficulties may arise in providing the targeted mobile device with identifying information concerning the source of the communication.
-
WO2005/039159 describes an information server including a processing system which is configured to receive one or more digital content sets, receive a caller system identifier and a called system identifier from the caller system, select a digital content set from-among the one or more digital content sets-using the caller system identifier and the called system identifier, and provide the selected digital content set to a called system corresponding to the called system identifier prior to the caller system establishing a communication channel to the called system.DE3742359 describes a telecommunication system using DTMF signaling. - In one aspect, there is provided a system for transmitting identifying information about a source of an incoming communication to a mobile device. The system has a communications platform for receiving the incoming communication and initiating a connection between the source of the incoming communication and the mobile device and a DTMF module coupled to the communications platform for generating and transmitting a DTMF message to the mobile device upon receipt of an incoming communication by the communications platform. If the source of the incoming communication has an enterprise-assigned number, the DTMF message comprises an identifying key corresponding to the key field of a profile list comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list, and otherwise, the DTMF message comprises an identifying number for the source of the incoming communication.
- In another aspect, there is provided a method of transmitting identifying information about a source of an incoming communication to a mobile device connected to an enterprise network. The method comprises, receiving the incoming communication at the enterprise network; initiating a connection between the source of the incoming communication and the mobile device; and generating and transmitting a DTMF message to the mobile device. If the source of the incoming communication has a enterprise-assigned number, the DTMF message comprises an identifying key corresponding to the key field of a profile list comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list, and otherwise, the DTMF message comprises an identifying number for the source of the incoming communication.
- In another aspect, there is provided a method of displaying identifying information about a source communication device to a user of a mobile device connected to an enterprise network. The method comprises: receiving a notification of an incoming communication from the enterprise network, the notification comprising a DTMF message; using the DTMF message to determine the identifying information of the source communication device; and displaying the identifying information on the mobile device.
- Other aspects of the present application will be apparent to those of ordinary skill in the art from a review of the following detailed description in conjunction with the drawings.
- Reference will now be made, by way of example, to the accompanying drawings which show example embodiments of the present application, and in which:
-
Figure 1 shows, in block diagram form, an example system for managing enterprise-related mobile calls, including an enterprise communications platform; -
Figure 2 shows, in block diagram form, further details of an embodiment of the enterprise communications platform; -
Figure 3 shows another embodiment of the enterprise communications platform; -
Figure 4 shows yet another embodiment of the enterprise communications platform; -
Figures 5A and5B show, in block diagram form, further details of the enterprise communications platform ofFigure 3 ; -
Figure 6A is a signaling diagram generally indicating how mobile-originated, mobile-initiated calls are processed by the network ofFigure 5 ; -
Figure 6B is a signaling diagram generally indicating how mobile-originated, PBX-initiated, calls are processed by the network ofFigure 5 ; -
Figure 7A is a signaling diagram generally indicating how mobile-terminated, mobile-initiated calls are processed by the network ofFigure 5 ; -
Figure 7B is a signaling diagram generally indicating how mobile-terminated, PBX-initiated calls are processed by the network ofFigure 5 ; and -
Figure 8 shows a method of providing identifying information about a source communication to a mobile device according to an embodiment. - Similar reference numerals may have been used in different figures to denote similar components.
- Embodiments of the present application are not limited to any particular operating system, mobile device architecture, server architecture, or computer programming language.
- The present application relates to the control and management of communications. Although reference may be made to "calls" in the description of example embodiments below, it will be appreciated that the described systems and methods are applicable to session-based communications in general and not limited to voice calls. It will also be appreciated that the systems and methods may not be limited to sessions and may be applicable to messaging-based communications in some embodiments.
- Reference is now made to
Figure 1 , which shows, in block diagram form, an example system, generally designated 10, for the control and management of communications. Thesystem 10 includes an enterprise orbusiness system 20, which in many embodiments includes a local area network (LAN). In the description below, the enterprise orbusiness system 20 may be referred to as anenterprise network 20. It will be appreciated that theenterprise network 20 may include more than one network and may be located in multiple geographic areas in some embodiments. - The
enterprise network 20 may be connected, often through afirewall 22, to a wide area network (WAN) 30, such as the Internet. Theenterprise network 20 may also be connected to a public switched telephone network (PSTN) 40 via direct inward dialing (DID) trunks or primary rate interface (PRI) trunks. - The
enterprise network 20 may also communicate with a public land mobile network (PLMN) 50, which may also be referred to as a wireless wide area network (WWAN) or, in some cases, a cellular network. The connection with thePLMN 50 may be made via arelay 26, as known in the art. - The
enterprise network 20 may also provide a wireless local area network (WLAN) 32a featuring wireless access points.Other WLANs 32 may exist outside theenterprise network 20. For example,WLAN 32b may be connected toWAN 30. - The
system 10 may include a number of enterprise-associated mobile devices 11 (only one shown). Themobile devices 11 may include devices equipped for cellular communication through thePLMN 50, mobile devices equipped for Wi-Fi communications over one of theWLANs 32, or dual-mode devices capable of both cellular and WLAN communications.WLANs 32 may be configured in accordance with one of the IEEE 802.11 specifications. - In some embodiments,
mobile devices 11 are two-way mobile communication devices having at least voice and data communication capabilities, including the capability to communicate with other digital or analog automatic data processing systems (i.e., computers). Examples ofmobile devices 11 suitable for use in implementing systems and methods disclosed herein include, depending on the functionality provided, data messaging devices, two-way pagers, cellular telephones with data messaging capabilities, wireless Internet appliances, data communication devices (with or without telephony capabilities), a clamshell device, personal digital devices (PDAs) and flip-phones. - It will be understood that the
mobile devices 11 include one or more radio transceivers and associated processing hardware and software to enable wireless communications with thePLMN 50 and/or WLAN(s) 32. In various embodiments, thePLMN 50 andmobile devices 11 may be configured to operate in compliance with any one or more of a number of wireless protocols, including GSM, GPRS, CDMA, EDGE, UMTS, EvDO, HSPA, 3GPP, or a variety of others. It will be appreciated that themobile device 11 may roam within thePLMN 50 and across PLMNs, in known manner, as the user moves. In some instances, the dual-modemobile devices 11 and/or theenterprise network 20 are configured to facilitate roaming between thePLMN 50 and aWLAN 32, and are thus capable of seamlessly transferring sessions (such as voice calls) from a connection with the cellular interface of the dual-mode device 11 to theWLAN 32 interface of the dual-mode device 11, and vice versa. - The
enterprise network 20 typically includes a number of networked servers, computers, and other devices. For example, theenterprise network 20 may connect one or more desktop or laptop computers 15 (one shown). The connection may be wired or wireless in some embodiments. Theenterprise network 20 may also connect to one or more digital telephone sets 17 (one shown). - The
enterprise network 20 may include one or more mail servers, such asmail server 24, for coordinating the transmission, storage, and receipt of electronic messages for client devices operating within theenterprise network 20. Examples of mail servers suitable for use in implementing systems and methods disclosed herein include the Microsoft Exchange ServerTM and the IBM Lotus DominoTM server. Each user within the enterprise typically has at least one user account within theenterprise network 20. Associated with each user account is message address information, such as an e-mail address. Messages addressed to a user message address are stored on theenterprise network 20 in themail server 24. The messages may be retrieved by the user using a messaging application, such as an e-mail client application. The messaging application may be operating on a user'scomputer 15 connected to theenterprise network 20 within the enterprise. In some embodiments, the user may be permitted to access stored messages using a remote computer, for example at another location via theWAN 30 using a VPN connection. Using the messaging application, the user may also compose and send messages addressed to others, within or outside theenterprise network 20. The messaging application causes themail server 24 to send a composed message to the addressee, often via theWAN 30. - The
relay 26 serves to route messages received over thePLMN 50 from themobile device 11 to thecorresponding enterprise network 20. Therelay 26 also pushes messages from theenterprise network 20 to themobile device 11 via thePLMN 50. - The
enterprise network 20 also includes anenterprise server 12. Together with therelay 26, theenterprise server 12 functions to redirect or relay incoming e-mail messages addressed to a user's e-mail address within theenterprise network 20 to the user'smobile device 11 and to relay incoming e-mail messages composed and sent via themobile device 11 out to the intended recipients within theWAN 30 or elsewhere. Theenterprise server 12 andrelay 26 together facilitate "push" e-mail service for themobile device 11 enabling the user to send and receive e-mail messages using themobile device 11 as though the user were connected to an e-mail client within theenterprise network 20 using the user's enterprise-related e-mail address, for example oncomputer 15. - As is typical in many enterprises, the
enterprise network 20 includes a Private Branch eXchange (although in various embodiments the PBX may be a standard PBX or an IP-PBX, for simplicity the description below uses the term PBX to refer to both) 16 having a connection with thePSTN 40 for routing incoming and outgoing voice calls for the enterprise. ThePBX 16 is connected to thePSTN 40 via DID trunks or PRI trunks, for example. ThePBX 16 may use ISDN signaling protocols for setting up and tearing down circuit-switched connections through thePSTN 40 and related signaling and communications. In some embodiments, thePBX 16 may be connected to one or moreconventional analog telephones 19. ThePBX 16 is also connected to theenterprise network 20 and, through it, to telephone terminal devices, such as digital telephone sets 17, soft-phones operating oncomputers 15, etc. Within the enterprise, each individual may have an associated extension number, sometimes referred to as a PNP (private numbering plan), or direct dial phone number. Calls outgoing from thePBX 16 to thePSTN 40 or incoming from thePSTN 40 to thePBX 16 are typically circuit-switched calls. Within the enterprise, e.g. between thePBX 16 and terminal devices, voice calls are often packet-switched calls, for example Voice-over-IP (VoIP) calls. - The
enterprise network 20 may further include a Service Management Platform (SMP) 18 for performing some aspects of messaging or session control, like call control and advanced call processing features. TheSMP 18 may, in some cases, also perform some media handling. Collectively theSMP 18 andPBX 16 may be referred to as the enterprise communications platform, generally designated 14. It will be appreciated that theenterprise communications platform 14 and, in particular, theSMP 18, is implemented on one or more servers having suitable communications interfaces for connecting to and communicating with thePBX 16 and/or DID/PRI trunks. Although theSMP 18 may be implemented on a stand-alone server, it will be appreciated that it may be implemented into an existing control agent/server as a logical software component. As will be described below, theSMP 18 may be implemented as a multi-layer platform. - The
enterprise communications platform 14 implements the switching to connect session legs and may provide the conversion between, for example, a circuit-switched call and a VoIP call, or to connect legs of other media sessions. In some embodiments, in the context of voice calls theenterprise communications platform 14 provides a number of additional functions including automated attendant, interactive voice response, call forwarding, voice mail, etc. It may also implement certain usage restrictions on enterprise users, such as blocking international calls or 1-900 calls. In many embodiments, Session Initiation Protocol (SIP) may be used to set-up, manage, and terminate media sessions for voice calls. Other protocols may also be employed by theenterprise communications platform 14, for example, Web Services, Computer Telephony Integration (CTI) protocol, Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions (SIMPLE), and various custom Application Programing Interfaces (APIs), as will be described in greater detail below. - One of the functions of the
enterprise communications platform 14 is to extend the features of enterprise telephony to themobile devices 11. For example, theenterprise communications platform 14 may allow themobile device 11 to perform functions akin to those normally available on a standard office telephone, such as the digital telephone set 17 or analog telephone set 15. Example features may include direct extension dialing, enterprise voice mail, conferencing, call transfer, call park, etc. - Reference is now made to
Figures 2 to 4 , which show example embodiments of theenterprise communications system 14. Again, although references are made below to "calls" or call-centric features it will be appreciated that the architectures and systems depicted and described are applicable to session-based communications in general and, in some instances, to messaging-based communications. -
Figure 2 illustrates an embodiment intended for use in a circuit-switched TDM context. ThePBX 16 is coupled to theSMP 18 viaPRI connection 60 or other suitable digital trunk. In some embodiments, thePRI connection 60 may include a first PRI connection, a second PRI connection, and a channel service unit (CSU), wherein the CSU is a mechanism for connecting computing devices to digital mediums in a manner that allows for the retiming and regeneration of incoming signals. It will be appreciated that there may be additional or alternative connections between thePBX 16 and theSMP 18. - In this embodiment, the
SMP 18 assumes control over both call processing and the media itself. This architecture may be referred to as "First Party Call Control". Many of the media handling functions normally implemented by thePBX 16 are handled by theSMP 18 in this architecture. Incoming calls addressed to any extension or direct dial number within the enterprise, for example, are always first routed to theSMP 18. Thereafter, a call leg is established from theSMP 18 to the called party within the enterprise, and the two legs are bridged. Accordingly, theSMP 18 includes adigital trunk interface 62 and a digital signal processing (DSP)conferencing bridge 64. TheDSP conferencing bridge 64 performs the bridging of calls for implementation of various call features, such as conferencing, call transfer, etc. Thedigital trunk interface 62 may be implemented as a plurality of telephonic cards, e.g. Intel Dialogic cards, interconnected by a bus and operating under the control of a processor. Thedigital trunk interface 62 may also be partly implemented using a processor module such as, for example, a Host Media Processing (HMP) processor. - The
SMP 18 may includevarious scripts 66 for managing call processing. Thescripts 66 are implemented as software modules, routines, functions, etc., stored in non-volatile memory and executed by the processor of theSMP 18. Thescripts 66 may implement call flow logic, business logic, user preferences, call service processes, and various feature applications. -
Figure 3 shows an embodiment of anenterprise communications system 14 in which thePBX 16 performs the functions of terminating and/or bridging media streams, but call control functions are largely handled by theSMP 18. In this embodiment, theSMP 18 may be referred to as acall control server 18. This architecture may be referred to as "Third-Party Call Control". - The
call control server 18 is coupled to thePBX 16, for example through the LAN, enabling packet-based communications and, more specifically, IP-based communications. In one embodiment, communications between thePBX 16 and thecall control server 18 are carried out in accordance with SIP. In other words, thecall control server 18 uses SIP-based communications to manage the set up, tear down, and control of media handled by thePBX 16. In one example embodiment, thecall control server 18 may employ a communications protocol conforming to the ECMA-269 or ECMA-323 standards for Computer Supported Telecommunications Applications (CSTA). -
Figure 4 shows yet another embodiment of theenterprise communications system 14. This embodiment reflects the adaptation of an existing set of call processing scripts to an architecture that relies on third-party call control, with separate call control and media handling. TheSMP 18 includes acall processing server 74. Thecall processing server 74 includes the scripts or other programming constructs for performing call handling functions. TheSMP 18 also includes aSIP server 72 and amedia server 76. Theseparate SIP server 72 andmedia server 76 logically separate the call control from media handling. TheSIP server 72 interacts with thecall processing server 74 using a computer-implemented communications handling protocol, such as one of the ECMA-269 or ECMA-323 standards. These standards prescribe XML based messaging for implementing Computer Supported Telecommunications Applications (CSTA). - The
SIP server 72 interacts with themedia server 76 using SIP-based media handling commands. For example, theSIP server 72 andmedia server 76 may communicate using Media Server Markup Language (MSML) as defined in IETF document Saleem A., "Media Server Markup Language", Internet Draft, draft-saleem-msml-07, August 7, 2008. Themedia server 76 may be configured to perform Host Media Processing (HMP). - Other architectures or configurations for the
enterprise communications system 14 will be appreciated by those ordinarily skilled in the art. - Reference is now made to
Figures 5A and5B , collectively referred to asFigure 5 , which shows another embodiment of theenterprise communications system 14 with a Third Party Call Control architecture. In this embodiment, theSMP 18 is a multi-layer platform that includes aprotocol layer 34, aservices layer 36 and anapplication layer 38. Theprotocol layer 34 includes a plurality of interface protocols configured for enabling operation of corresponding applications in theapplication layer 38. Theservices layer 36 includes a plurality of services that can be leveraged by the interface protocols to create richer applications. Finally, theapplication layer 38 includes a plurality of applications that are exposed out to the communication devices and that leverage corresponding ones of the services and interface protocols for enabling the applications. - Specifically, the
protocol layer 34 preferably includes protocols which allow media to be controlled separate from data. For example, theprotocol layer 34 can include, among other things, a Session Initiation Protocol orSIP 80, aWeb Services protocol 82, an Application Programming Interface orAPI 84, a Computer Telephony Integration protocol orCTI 86, and a Session Initiation Protocol for Instant Messaging and Presence Leveraging Extensions orSIMPLE protocol 88. It is contemplated that the interface protocols 80-88 are plug-ins that can interface directly with corresponding servers in theenterprise network 20, which will be further described below. - For the purposes of this disclosure,
SIP 80 will be utilized, although it is appreciated that thesystem 10 can operate using the above disclosed or additional protocols. As known by those of ordinary skill in the art, SIP is the IETF (Internet Engineering Task Force) standard for multimedia session management, and more specifically is an application-layer control protocol for establishing, maintaining, modifying and terminating multimedia sessions between two or more endpoints. As further known by those of ordinary skill in the art, theSIP protocol 80 includes two interfaces for signaling: SIP-Trunk (hereinafter referred to as "SIP-T") and SIP-Line (hereinafter referred to as "SIP-L"). Specifically, the SIP-T interface is utilized when the endpoint is a non-specific entity or not registered (i.e., when communicating between two network entities). In contrast, the SIP-L interface is utilized when the endpoint is registered (i.e., when dialing to a specific extension). The specific operation of thesystem 10 utilizingSIP 80 will be described in further detail below. - In the embodiment shown
SMP 18 also includes a plurality of enablers, among other things, aVoIP enabler 90, a Fixed Mobile Convergence orFMC enabler 92, aconference services enabler 94, apresence enabler 96 and an Instant Messaging orIM enabler 98. Each of the enablers 90-98 are used by corresponding services in theservices layer 36 that combine one or more of the enablers. Each of the applications in theapplication layer 38 is then combined with one or more of the services to perform the desired application. For example, a phone call service may use the VoIP or PBX enabler, and an emergency response application may use the phone call service, an Instant Messenger service, a video call service, and email service and/or a conference service. - The
application layer 38 may include aconference services application 63 that, together with theconference services enabler 94, enables multiple communication devices (including desk telephones and personal computers) to participate in a conference call through use of acentralized conference server 55. As seen inFigure 5 , theconference server 55 is provided in theenterprise network 20 and is in communication with theconference services enabler 94 preferably through theSIP protocol 80, although it is recognized that additional protocols that control media separate from data may be appropriate, such as theWeb Services protocol 82 or theCTI protocol 86. As will be described in further detail below, theconference call server 55 is configured for directing media and data streams to and from one or more communication devices (i.e.,mobile devices 11,telephones 17, and computers 15). - Turning now to
Figures 6A through 7B , the general operation of thesystem 10 usingSIP 80 as the signaling protocol will be discussed, although it is recognized that the present system is not limited to the processes discussed herein. The signaling descriptions that follow are based on Third Party Call Control architecture, such as that illustrated inFigures 3 or5 . It will be appreciated that similar but slightly modified signaling may be used in a First Party Call Control architecture, wherein thePBX 16 will pass media through to theSMP 18 for direct media handling by theSMP 18. Variations in the signaling to adapt to various architectures will be appreciated by those ordinarily skilled in the art. -
Figure 6A provides a signaling diagram for a call originating from one of themobile devices 11 to atarget phone 101 connected to a Private Branch Exchange Server orPBX 16 provided within theenterprise network 20. First, thedevice 11 sends a mobile originated call request with its cellular number and the destination number of thetarget phone 101 to the SMP 18 (block 100). In some embodiments, the mobile originated call request may be sent via the WLAN through theenterprise server 12. In another embodiment, the call request may be sent via the PLMN/PSTN through thePBX 16, for example as an SMS message or using another messaging operation. TheSMP 18 confirms the call request by sending the DNIS number to the device 11 (block 102). Next, thedevice 11 makes a cellular call using the DNIS number, which is received by the PBX 16 (block 104). As the DNIS has been configured in thePBX 16 to be routed to theSMP 18 via SIP-T, in response to the incoming call, thePBX 16 sends an invite over SIP-T with the DNIS number to the SMP 18 (block 106). TheSMP 18 matches the incoming call with the expected call from the mobile, and if correct, acknowledges the invite by sending a 200 OK signal to thePBX 16, indicating that the mobile call leg is established (block 108). - The
SMP 18 then sets up the outgoing call leg to the destination. It does this by sending an invite over SIP-L to thePBX 16 with the destination number of the target phone (block 110). SIP-L is used so that the call can be correctly attributed to the individual within the organization within any call records that are being maintained by thePBX 16. When the invite is received, thePBX 16 dials the destination number to the target phone 101 (block 112), and thetarget phone 101 answers the call (block 114). When thetarget phone 101 is answered, thePBX 16 sends a 200 OK signal to theSMP 18 indicating that thetarget phone 101 is ready to receive data (block 115). TheSMP 18 then sends an invite over SIP-T to thePBX 16 and shuffles the SDP (Session Description Protocol, as known to those of ordinary skill in the art) to connect the call legs (block 116). When the call legs are connected, thePBX 16 sends a second 200 OK signal to the SMP 18 (block 118), and the users of thedevice 11 andtarget phone 101 can communicate with each other. - Note that between the cellular call leg being established and the outgoing call leg being answered, the mobile user hears ringing tones. These ringing tones may be provided by the
PBX 16 using the presentation of early media from the outgoing call leg, or they may be generated locally on thedevice 11 if early media is not available. In the latter case, it will be necessary to localize the ringing tone to match the tone normally heard with a call through thePBX 16. - The above description is known as a "mobile initiated" call, because the
SMP 18 provides themobile device 11 with the DNIS number into which themobile device 11 has called. Alternatively, the mobile originated call could be "PBX initiated", as shown inFigure 6B . Specifically, in a PBX-initiated call, upon receipt of the mobile originated call request (block 120), theSMP 18 confirms receipt of the call to themobile device 11 with an ANI number (block 122), which the mobile device uses to identify the incoming call from thePBX 16. ThePBX 16 then sends an invite over SIP-T to thePBX 16 with the cellular number of the device and the ANI number that is attached to the outgoing call (block 124). Upon receipt of the invite, thePBX 16 makes a cellular call to the device 11 (block 126), which is answered by the device (block 128). Thedevice 11 checks the ANI number in the incoming call to confirm if the number is actually from thePBX 16. If the ANI number is stripped for any particular reason, then thedevice 11 may be configured to answer the call as a regular cellular call, or it may reject the call as unknown. When thedevice 11 answers the PBX-initiated call, thePBX 16 sends a 200 OK signal to theSMP 18, indicating that the call leg to the device is established (block 130). - In response, the
SMP 18 sends an invite over SIP-L with the destination number of thetarget phone 101 to the PBX 16 (block 132). When the invite is received at thePBX 16, the PBX dials the destination number to the target phone 101 (block 134), thetarget phone 101 picks up the call (block 136), and a 200 OK signal is sent from thePBX 16 to the SMP 18 (block 138), indicating that thetarget phone 101 is also ready to receive data. In response to the 200 OK, theSMP 18 sends an invite to thePBX 16, shuffling the SDP to connect the call legs (block 140). Finally, when the call legs are connected, thePBX 16 sends a second 200 OK signal to theSMP 18, and the users of thedevice 11 andtarget phone 101 are able to communicate with each other. - In both instances, the
SMP 18 is performing third party call control of the two call legs, thePBX 16 remaining in control of the call. The decision of whether to proceed with a mobile-initiated call or a PBX-initiated call can be set by policy. Specifically, the option to select either mobile-initiated or PBX-initiated calls is a feature provided in theSMP 18, and an administrator for theenterprise network 20 can determine which setting to use. For example, in some cases it may be more cost effective for the corporation to utilize PBX-initiated calls rather than mobile-initiated calls, and vice versa. However, it is appreciated that thesystem 10 is not limited to the above processes. -
Figures 7A and7B are signaling diagrams illustrating a mobile terminatedcall utilizing SIP 80. Specifically, and for the purposes of this disclosure, thetarget phone 101 is originating the call, which will send a call to the mobile device. Turning first toFigure 7A , an incoming call is made from thetarget phone 101 to the PBX 16 (block 150). When the call is received at thePBX 16, thePBX 16 sends an invite to theSMP 18 over SIP-L (block 152). - In response to the invite, the
SMP 18 sends a call request with the DNIS number and source details to the device 11 (block 154), which is confirmed to the SMP (block 156). These source details may be sent via a data connection between thesystem 20 and themobile device 11, such as that discussed further in relation toFigure 8 . In addition to confirming the call, themobile device 11 sends a cellular call to the DNIS number at the PBX 16 (block 158). Again, as the DNIS number is routed in the dialing plans to theSMP 18, upon receipt of the cellular call, thePBX 16 sends an invite over SIP-T to theSMP 18 with the DNIS number (block 160). In response to the invite, a "200 OK" signal is sent over SIP-T from theSMP 18 to thePBX 16, acknowledging that the call leg to themobile device 11 is established (block 162). Finally, the initial invite (block 152) is acknowledged with the "200 OK" signal with the cellular SDP, at which point the call legs are joined and thetarget phone 101 anddevice 11 can communicate with each other on the call. - The diagram shown in
Figure 7A illustrates a "mobile-initiated" call, because, as discussed above with respect toFigures 6A and6B , theSMP 18 presents themobile device 11 with the DNIS number at thePBX 16 into which to call. However, it is also possible to employ a "PBX-initiated" mobile terminated call, as shown inFigure 7B , where thePBX 16 sends an incoming call to thedevice 11 with the ANI number of thetarget phone 101. - Specifically, similar to the mobile initiated call described above and shown in
Figure 7A , thetarget phone 101 sends an incoming call to the destination number of the device, which is received at the PBX 16 (block 170). Upon receipt of the call, thePBX 16 sends an invite over SIP-L to the SMP 18 (block 172) with the source number of thetarget phone 101. In response to the invite, theSMP 18 sends a call request with the source number to the device 11 (block 174), with the ANI number the device should expect in the incoming call, the call request being confirmed by the device (block 176). At this point in the PBX-initiated call, theSMP 18 sends an invite over SIP-T to thePBX 16 with the cellular number and ANI number to use (block 178), prompting thePBX 16 to make a cellular call to thedevice 11 with the ANI number (block 180), prompting the device to ring. Thedevice 11 answers the call (block 182), and a "200 OK" signal is sent from thePBX 16 to theSMP 18, acknowledging that the cellular call leg to thedevice 11 is established (block 184). In response, a "200 OK" signal is also sent from theSMP 18 to thePBX 16, acknowledging that the call leg to thetarget phone 101 is also established (block 186). TheSMP 18 shuffles the SDP to connect the call legs, the call legs are joined, and thetarget phone 101 anddevice 11 can communicate with each other on the call. - As discussed above with respect to
FIGs. 6A and6B , theSMP 18 remains in control of the signaling between thetarget phone 101 and themobile device 11 in both the mobile-initiated and PBX-initiated calls. Again, the decision to proceed with a mobile-initiated call or a PBX-initiated call is based on policy and may be set by a system administrator. In some cases, it may be more efficient or cost effective for the administrator to decide that PBX-initiated calls should be used, and in other cases, it may be more efficient or cost effective for mobile-initiated calls to be utilized. As these policy decisions may vary by organization and are not imperative to the scope of the present application, they will not be discussed in further detail. - Reference is now made to
Figure 8 , which shows an embodiment of amethod 800 of providing to amobile device 11 identifying information about a source of a communication to the mobile device.Method 800 is suitable for implementation by, for example, the enterprise server architecture shown inFigure 1 to which reference will be made where appropriate. - At 802 in
Figure 8 , a communication such as a request to initiate a call intended for amobile device 11 is received byPBX server 16 or other device associated withenterprise network 20. This corresponds, for example, to block 150 ofFigure 7A or block 170 ofFigure 7B . - The
PBX server 16 or other device receiving the incoming communication request may be capable of sending and receiving different types or layers of data to and from themobile device 11, particularly wheremobile device 11 is a dual-mode device as described above. For example, an auditory layer (or voice channel or voice service) can be used to transfer data representing voice and other auditory information to and from themobile device 11. In some embodiments, a data layer (or data channel or data service) can be used to transfer other data, such as non-auditory data, between theenterprise network 20 and themobile device 11. For example, sending the ANI number to the mobile device, as shown inblocks Figures 6B and7B respectively, can be done using the data layer. - Identifying information about the source of an incoming communication may be transferred to a
mobile device 11 from theenterprise network 11 using the data layer. For example, atblock 154 ofFigure 7A , source details are sent to themobile device 11 from theSMP 18 using the data layer. Such source details, however, can be sent via the data layer only when and where data service is available. - At 804, the
system mobile device 11 and theenterprise network 20. If data service is available, the identifying information is sent to the mobile device using the data layer atblock 806. The identifying information can then be displayed on themobile device 11 and the communication may proceed as depicted, for example, inFigure 7A . - In some situations, however, data service may not be available between the
enterprise network 20 and themobile device 11. This may occur, for example, when the device is roaming. Alternatively, the mobile device may be an older device or other device with which data service is never available. In such cases, the identifying information about the source of a communication can not be sent using the data layer. In other situations, it may not be desirable to use the data service between theenterprise network 20 and themobile device 11 even where data service is available, for example, where the sending of identifying information does not easily fit into the data service protocol. Where no data service is available or the use of data service is undesirable, other techniques may be used to transfer identifying information to themobile device 11 if this information is to be displayed on the device. - At
block 808, the system determines whether dual-tone multi-frequency (DTMF) capabilities are available for themobile device 11. If DTMF is available then a DTMF message comprising the identifying information can be generated by theenterprise network 20 and transmitted to themobile device 11. This may be done, for example, using a DTMF module coupled to thecommunications platform 14 resident in a memory of theenterprise network 20 to be executed by a processor of theenterprise network 20. Dual-tone multi-frequency (DTMF) signaling is used for telephone signaling in the voice-frequency band. Hence, a DTMF message can be sent to themobile device 11 regardless of whether or not data service is availible between theenterprise network 20 and themobile device 11. Methods of generating and receiving DTMF messages are well known in the art. - The
mobile device 11 may then use information extracted from the DTMF message to identify the source of the communication. The contents of such a DTMF message may depend on any suitable factors, including for example, whether or not the source of the incoming communication is a device known to theenterprise network 20. For example, the content of the DTMF message may depend on whether or not the assigned telephone number or other address information associated with the source of the communication has been assigned or otherwise recognized by the enterprise network or its administrator(s). A device associated with an enterprise-assigned number is sometimes referred to as a participant in the enterprise network. - If the source of the incoming communication is an enterprise participant (e.g., has an enterprise-assigned or -acknowledged number) then, at
block 812, the DTMF message may contain an identifying key. The identifying key may allow themobile device 11 to look up information about the source of the communication in, for example, a profile list stored on themobile device 11. The profile list may include a list of all participants (or a specific subset of participants) for theenterprise network 20 and may be passed to each participant device using the data layer when data service is available or through some other means. Updates to the profile list may be sent to themobile device 11 from theenterprise network 20 periodically on a set schedule or whenever changes occur to the list. The profile list may, for example, be in the form of a spreadsheet and may comprise identifying information entries for each participant in the list including, for example, each participant's name and phone number as well as possibly other information such as a participant's location, department and internal extension. Each entry in the profile list may contain a key field. The length of the profile list may be limited by the length of the key field. In general, the length of the key field may be limited to a size which is practical to be sent using the methods discussed herein. The identifying key contained in the DTMF message may be used by themobile device 11 to find the appropriate entry in the profile list with a matching key field. Some or all of the information from the appropriate entry in the profile list may then be displayed on themobile device 11. An advantage of the use of such identifying keys is economy and efficiency in the tracking and forwarding of data representing identifying information associated with enterprise participants. This can, for example, lead to increased communications bandwidth and other benefits. - Alternatively, identifying information for a participant can be stored in an address book or other suitably-configured data store associated with or otherwise accessible by the
mobile device 11 with an optionally hidden DTMF key field and Boolean value indicating that the entry is a participant. The mobile device can in such circumstances match the identifying key from the DTMF message to the entry in the address book with a matching DTMF key and extract the identifying information to be displayed. - It will be understood by those skilled in the art that the identifying key could itself be part of the identifying information, such as the user's telephone number, or it could be another number, such as a sequential or random number, assigned specifically for this purpose. The identifying key may be updated periodically for security purposes.
- If the source of the incoming communication is a non-participant (i.e. does not have an enterprise-assigned or acknowledged number), at
block 814 the DTMF message may contain or otherwise represent an identifying number (such as the telephone number) or other address information, or other information identifying the source of the communication. Such information can be extracted from the DTMF message and displayed on themobile device 11. Themobile device 11 can also display a message indicating, for example, that the source of the communication is an outside caller. - The DTMF message may also include a security key used by the
mobile device 11 to confirm that the DTMF message originates from theenterprise network 20. For example, theenterprise network 20 can maintain a database or other machine-readable store of security numbers (or other information) which it may permitmobile device 11 to access though the data layer when data service is available or through some other means. Such a store of numbers or other identifiers may be changed or updated periodically, or otherwise as appropriate or desired. When a DTMF message is sent to amobile device 11, the message may include such a security identifier. Themobile device 11 can extract the security identifier and check it against the security identifiers accessible by it viaenterprise network 20. If the security identifier in the message does not appear on the list maintained byenterprise network 20, themobile device 11 may assume there has been a breach in security and terminate the communication. It should be noted that this is only one possible implementation of the use of security identifiers or other keys, and those of skill in the art will recognize that there may be a number of different ways in which such a security key could be implemented. - If the
mobile device 11 for which a communication is intended does not support DTMF, atblock 816 the system can determine whether a caller identification code, such as the automatic number identification (ANI), of the communication can be manipulated. The ANI is a feature of telephony intelligent network services that permits subscribers to display or capture the telephone numbers of calling parties. An ANI may be sent to themobile device 11 from theenterprise network 20 when the call is initiated, for example atblock 174 ofFigure 7B . Where anenterprise network 20 is used to relay a communication to a mobile device, the ANI may be manipulated in order to send information about the source of the communication to themobile device 11 such as the number (e.g. telephone number) of the source of the communication. The manipulation of the ANI to include the number of a source communication is sometimes called ANI mangling. If ANI mangling is possible, the ANI will be manipulated atblock 818. - If ANI manipulation is available then, at
block 818, logic similar to that employed inblocks 810 to 814 may be utilized. In other words, if the source of the incoming communication is an enterprise assigned number then an identifying key to the profile list described above may be sent to the mobile device, as inblock 812 ofmethod 800. For example, in order for theenterprise network 20 to send an identifying key 1111 using ANI manipulation, the ANI may be the following: 992-001-1111. The first three digits, 992, could be used to identify the communication as Enterprise participant communication. The second three digits, 001, could be a security key or type of call identifier. The final four digits, 1111, could represent the identifying key to the same profile list used in DTMF logic described above. - If the source of the information is not an enterprise assigned number (non-participant) then the ANI may contain or otherwise represent an identifying number (such as the telephone number) or other address information, or other information identifying the source of the communication, as in
block 814. For example, for non-participant callers, the ANI could be 993-123-456-7890 where 993 identifies call as an Enterprise communication from non participant with caller id 1234567890. - The transmission of a telephone number, as may be done in
block 814, may be considered less secure than sending an idenifying key, as inblock 812, because the acutal number of source of the incoming communication is included in the message. - In some jurisdictions, the manipulation of an ANI is not permitted where the resulting number is not a number owned by the system performing the manipulation. For instance, in these jurisdictions, a
enterprise network 20 would not be permitted to manipulate the ANI to include the number of an outside (non-participant) caller. In such a case, theenterprise network 20 may set aside a number or other identifier which it does own to be used to indicate that an incoming communication is from an outside caller. The ANI can be manipulated atblock 820 to include this dedicated number. When themobile device 11 received a call indicating that the source of the communication is the dedicated number, it would recognize the number as an indication that the caller is an outside (non-participant) caller and can display a message to that effect. ANI mangling will normally be available for participant sources even in such jurisdictions because a participant source will, by definition, have a number assigned by theenterprise network 20. Hence, the number of a participant source will normally be owned by theenterprise network 20. - While the blocks of
method 800 are shown as occurring in a particular order, it will be appreciated by those skilled in the art that many of the blocks are interchangeable and may occur in different orders that that shown without materially affecting the end results of the method. - While the present disclosure is primarily described as a method, a person of ordinary skill in the art will understand that the present disclosure is also directed to an apparatus for carrying out the disclosed method and including apparatus parts for performing each described method block, be it by way of hardware components, a computer programmed by appropriate software to enable the practice of the disclosed method, by any combination of the two, or in any other manner. Moreover, an article of manufacture for use with the apparatus, such as a prerecorded storage device or other similar computer readable medium including program instructions recorded thereon, or a computer data signal carrying computer readable program instructions may direct an apparatus to facilitate the practice of the disclosed method. It is understood that such apparatus, articles of manufacture, and computer data signals also come within the scope of the present disclosure.
- Certain adaptations and modifications of the described embodiments can be made. Therefore, the above discussed embodiments are considered to be illustrative and not restrictive.
Claims (21)
- A system (20) for transmitting identifying information about a source of an incoming communication to a mobile device (11), the system (20) comprising,
a communications platform (14) for receiving the incoming communication and initiating a connection between the source of the incoming communication and the mobile device (11); and
a DTMF module coupled to the communications platform (14) for generating and transmitting a DTMF message to the mobile device (11) upon receipt of an incoming communication by the communications platform (14);
wherein, if the source of the incoming communication has an enterprise-assigned number, the DTMF message comprises an identifying key corresponding to a key field of a profile list stored on the mobile device comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list, and
otherwise, the DTMF message comprises an identifying number for the source of the incoming communication. - The system (20) of claim 1, wherein the identifying information entries each comprise one or more of a name, a location, a department, a telephone number and an extension number.
- The system (20) of claim 1 or claim 2, wherein the DTMF message further comprises a security key used by the mobile device (11) to confirm the origin of the DTMF message.
- The system (20) of any one of claims 1 to 3, wherein the DTMF message is sent to the mobile device (11) only when no data service is available between the system (20) and the mobile device (11).
- The system (20) of any one of claims 1 to 4, wherein, if DTMF is not available, a manipulated caller identification code is sent to the mobile device (11) when the connection is established.
- The system (20) of claim 5, wherein the manipulated caller identification code is an automatic number identification (ANI).
- The system (20) of claim 5 or claim 6, wherein, if the source of the incoming communication has an enterprise-assigned number, the manipulated caller identification code comprises an identifying key corresponding to the key field of the profile list.
- The system (20) of claim 5 or claim 6, wherein the manipulated caller identification code comprises the identifying information.
- The system (20) of claim 5 or claim 6, wherein the manipulated caller identification code comprises a number owned by the system (20) used to indicate that the source of the incoming communication does not have an enterprise-assigned number.
- A method of transmitting identifying information about a source of an incoming communication to a mobile device (11) connected to an enterprise network (20), the method comprising,
receiving the incoming communication at the enterprise network (20);
initiating a connection between the source of the incoming communication and the mobile device (11); and
generating and transmitting a DTMF message to the mobile device (11),
wherein, if the source of the incoming communication has a enterprise-assigned number, the DTMF message comprises an identifying key corresponding to a key field of a profile list stored on the mobile device comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list, and
otherwise, the DTMF message comprises an identifying number for the source of the incoming communication. - The method of claim 10, wherein the identifying information entries each comprise one or more of a name, a location, a department, a telephone number and an extension number.
- A method of displaying identifying information about a source communication device to a user of a mobile device (11) connected to an enterprise network (20), the method comprising:receiving a notification of an incoming communication from the enterprise network (20), the notification comprising a DTMF message;using the DTMF message to determine the identifying information of the source communication device; anddisplaying the identifying information on the mobile device (11), wherein the DTMF message comprises an identifying key corresponding to a key field of a profile list stored on the mobile device comprising enterprise-assigned numbers and an identifying information entry for each enterprise-assigned number in the profile list.
- The method of claim 12, wherein each identifying information entry comprises one or more of a name, a location, a department, a telephone number and an extension number.
- The method of any one of claims 12 to 13, wherein the DTMF message comprises an identifying number for the source communications device and the identifying information is the identifying number.
- The method of any one of claims 10 to 14, wherein the DTMF message comprises a security key used by the mobile device (11) to confirm the DTMF message as originating from the enterprise network (20).
- The method of any one of claims 10 to 15, wherein the DTMF message is sent to the mobile device (11) only when no data service is available between the enterprise network (20) and the mobile device (11).
- The method of any one of claims 10 to 16, wherein, if DTMF is not available, a manipulated caller identification code is sent by the enterprise network (20) to the mobile device (11) when a connection is established.
- The method of claim 17, wherein the manipulated caller identification code is an automatic number identification (ANI).
- The method of claim 17 or claim 18, wherein the manipulated caller identification code comprises the identifying information.
- The method of claim 17 to claim 19, wherein, if the source of the incoming communication has a enterprise-assigned number, the manipulated caller identification code comprises an identifying key corresponding to the key field of a profile list.
- The method of claim 17 or claim 18, wherein the manipulated caller identification code comprises a number owned by the enterprise network (20) used to indicate that the source of the incoming communication does not have an enterprise-assigned number.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09154042.7A EP2224700B1 (en) | 2009-02-27 | 2009-02-27 | System and method for providing identifying information to a mobile device |
CA2694891A CA2694891C (en) | 2009-02-27 | 2010-02-26 | System and method for providing identifying information to a mobile device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09154042.7A EP2224700B1 (en) | 2009-02-27 | 2009-02-27 | System and method for providing identifying information to a mobile device |
Publications (2)
Publication Number | Publication Date |
---|---|
EP2224700A1 EP2224700A1 (en) | 2010-09-01 |
EP2224700B1 true EP2224700B1 (en) | 2015-07-08 |
Family
ID=40902212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP09154042.7A Active EP2224700B1 (en) | 2009-02-27 | 2009-02-27 | System and method for providing identifying information to a mobile device |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2224700B1 (en) |
CA (1) | CA2694891C (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3742359C3 (en) | 1987-12-14 | 1995-12-07 | Siemens Ag | Telephone station |
US5946684A (en) * | 1997-02-18 | 1999-08-31 | Ameritech Corporation | Method and system for providing computer-network related information about a calling party |
US7233658B2 (en) * | 2002-08-13 | 2007-06-19 | At&T Knowledge Ventures, L.P. | Flexible ring-tone service |
US7113577B2 (en) | 2003-10-17 | 2006-09-26 | Sprint Communications Company L.P. | Caller identification employing a digital content set |
-
2009
- 2009-02-27 EP EP09154042.7A patent/EP2224700B1/en active Active
-
2010
- 2010-02-26 CA CA2694891A patent/CA2694891C/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2224700A1 (en) | 2010-09-01 |
CA2694891C (en) | 2014-02-11 |
CA2694891A1 (en) | 2010-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8660254B2 (en) | System and method for call management | |
US8078151B2 (en) | Method and system to automatically park a voice call for data transfer | |
US8588754B2 (en) | Personal call center | |
US8676179B2 (en) | System and method for providing identifying information to a mobile device | |
US20110182281A1 (en) | Facilitating verification of call leg setup in third party call control systems | |
US8428647B2 (en) | Verifying and identifying incoming PBX calls on mobile devices | |
US8379860B2 (en) | System and method for establishing a secure communication link | |
EP2387219B1 (en) | Registering an enterprise-associated mobile device with a private branch exchange | |
EP2224700B1 (en) | System and method for providing identifying information to a mobile device | |
CA2722550C (en) | Verifying and identifying incoming pbx calls on mobile devices | |
CA2721475C (en) | Facilitating verification of call leg setup in third party call control systems | |
EP2355536B1 (en) | System and method for the synchronized transmission of tone sequences | |
EP2224762B1 (en) | System and method for establishing a secure communication link | |
CA2693693C (en) | Method and system to automatically park a voice call for data transfer | |
EP2348698B1 (en) | Expedited media interconnection in third party call control | |
CA2693241C (en) | Personal call center | |
CA2735510A1 (en) | Call access management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20090227 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AXX | Extension fees paid |
Extension state: AL Payment date: 20090227 Extension state: RS Payment date: 20090227 Extension state: BA Payment date: 20090227 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ASCENDENT TELECOMMUNICATIONS INC. Owner name: BLACKBERRY LIMITED |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: RESEARCH IN MOTION LIMITED |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BLACKBERRY LIMITED |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: BLACKBERRY LIMITED |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
INTG | Intention to grant announced |
Effective date: 20150202 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA RS |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 736154 Country of ref document: AT Kind code of ref document: T Effective date: 20150715 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602009032043 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 736154 Country of ref document: AT Kind code of ref document: T Effective date: 20150708 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20150708 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151008 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151009 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 8 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151109 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20151108 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602009032043 Country of ref document: DE |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160229 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
26N | No opposition filed |
Effective date: 20160411 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160227 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160229 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160229 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20160227 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 9 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: PLFP Year of fee payment: 10 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20090227 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20160229 Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20150708 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20240228 Year of fee payment: 16 Ref country code: GB Payment date: 20240220 Year of fee payment: 16 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R082 Ref document number: 602009032043 Country of ref document: DE Ref country code: DE Ref legal event code: R081 Ref document number: 602009032043 Country of ref document: DE Owner name: MALIKIE INNOVATIONS LTD., IE Free format text: FORMER OWNER: BLACKBERRY LTD., WATERLOO, ONTARIO, CA |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20240226 Year of fee payment: 16 |